From the cyber front line


The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

Submitted by CyberHub Summit on Thu, 07/05/2018 - 17:40
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

A huge setback in our web application use is the vulnerability of our data. Traditionally this has been addressed through encryption, more recently 'end-to-end' encryption which by wording alone suggests that we are 'covered' for securing our data.

Well, the wording is misleading because end-to-end encryption has until now, been unable to completely secure data in all conditions.


5 Simple Truths about Cryptocurrency

Submitted by CyberHub Summit on Mon, 06/25/2018 - 14:45
5 Simple Truths about Cryptocurrenc
5 Simple Truths about Cryptocurrency

The cryptocurrency world is in hot and volatile water again with Bithumb, the world's sixth most active crypto trading platform declaring that hackers stole 35bn in crypto cash (that's a Dollar value of $31.6m) 'overnight' last week. This is the second time in a week that South Korean crypto-currency exchanges have been attacked, with Coinrail being last week's 40bn crypto-coin victim.


Kids and Smart Phones.

Submitted by CyberHub Summit on Thu, 06/21/2018 - 16:19
Kids and Smart Phones.
Kids and Smart Phones.

Although there is no legal guideline, the consensus is that our children don’t really need smart phones, not until they are at least twelve, possibly fourteen, or at least, that's what Bill Gates was saying in 2017.


Meet the CDO

Submitted by CyberHub Summit on Thu, 06/21/2018 - 15:58
Meet the CDO
Meet the CDO

The revenues on technology investment are increasing in all areas. From Insurance through to Oil and Gas, spending on cyber is becoming an integral part of every industry and several new positions have been created or are being redefined as a strategic and necessary part of the organizational structure to meet that challenge.  


Five Steps to Data Protection

Submitted by CyberHub Summit on Thu, 06/21/2018 - 15:12
Five Steps to Data Protection
Five Steps to Data Protection

Cybercrime incidents are snowballing, and no business, small or large, is invulnerable. The rates of attacks rise and so does the price tag on recovery, which includes financial losses, reputation and operational capacity.


Making Digital Currency trading a little safer.

Submitted by CyberHub Summit on Thu, 06/21/2018 - 14:12
Making Digital Currency trading a little safer.
Making Digital Currency trading a little safer.

Being a cautious group by nature, Cyber security enthusiasts always approach new digital currencies with caution. Forget the hype and the criminal element that places Bitcoin and the blockchain at the center of many an international drug scandal and on the SEC hitlist, the safety and security of everyday trading is troubling to cyber security enthusiasts.


Cyber Crime 2018

Submitted by CyberHub Summit on Thu, 06/21/2018 - 12:50
Cyber Crime 2018
Cyber Crime 2018

As we draw closer to the halfway point of 2018, a clear and alarming picture of cybercrime and its' true annual cost is emerging. With spending exponentially rising on both prevention and damage, the wake-up call that came from the IBM Chairman, Rometty back in 2015, that 'cyber-crime was the greatest threat to every company in the world' is simply becoming more of a reality, year by year.